Friday, December 28, 2012

Friday, December 21, 2012

World’s Most Used Encryption Technologies, Cracked in No Time with $299 Forensics Tool | HOTforSecurity

World’s Most Used Encryption Technologies, Cracked in No Time with $299 Forensics Tool | HOTforSecurity: The Elcomsoft tool analyzes memory dumps taken while these encrypted volumes are mounted and isolates the encryption keys. When the process is over, the forensic team (or attacker) can mount the volumes as they would normally do and authenticate with the data provided by the forensics tool.

Sunday, December 16, 2012

Population Screening in Hereditary Hemochromatosis - Annual Review of Public Health, 21(1):65

Population Screening in Hereditary Hemochromatosis - Annual Review of Public Health, 21(1):65: Hemochromatosis is a common autosomal recessive condition found in the homozygous state in 1/200–1/400 people of northern-, central-, and western-European origin.

Screening for Hemochromatosis: Recommendation Statement

Screening for Hemochromatosis: Recommendation Statement: This statement summarizes the U.S. Preventive Services Task Force (USPSTF) recommendation on screening for hemochromatosis and the supporting scientific evidence.

Thursday, December 13, 2012

Invasion of the cyber hustlers

Invasion of the cyber hustlers: "The cybertheorists, however, are a peculiarly corporatist species of the Leninist class: they agitate for constant revolution but the main beneficiaries will be the giant technology companies before whose virtual image they prostrate themselves"

'via Blog this'

A case study in personal genomics from Genomes Unzipped

A case study in personal genomics : Genomes Unzipped: After some thinking, I decided to take my test results to my GP, and see if there was any advice or testing he would recommend. In the end, my GP referred me to a clinical geneticist, which started a cascade of appointments which in turn led to a number of important changes in how I treat my own health.

Wednesday, November 28, 2012

Money and Manipulation: Documentary Takes On the Super-rich Residents of 740 Park | Observer

Money and Manipulation: Documentary Takes On the Super-rich Residents of 740 Park | Observer: This is a story about the richest of the rich, as it were, the residents of 740 Park—a building that is home to more billionaires than any other building in New York—and how they have managed to claim a larger and larger share of the nation’s wealth, or as Mr. Gibney puts it in his opening voice-over, how they have enjoyed “unprecedented prosperity from a system they increasingly control.”

Extending Your Content Reach Through Social Media | Business 2 Community

Extending Your Content Reach Through Social Media | Business 2 Community: As savvy organizations work to engage with target audiences through this new medium, one fact has clearly emerged – quality content is vital to social media campaigns that are meaningful, impactful and provide lasting value.

SC's Data Security Company Also Got Hacked - FITSNews

SC's Data Security Company Also Got Hacked - FITSNews: South Carolinians by the tens of thousands are signing up with Experian – one of the nation’s largest credit reporting firms – to protect their data in the wake of an unprecedented security breach at the S.C. Department of Revenue (SCDOR). In fact the state of South Carolina is paying (up to $12 million) to cover the costs associated with this protection – even though Experian is likely to make millions in recurring business off of the deal.

But will such a move do anything to make our state’s data safer?

Experian Customers Unsafe as Hackers Steal Credit Report Data - Bloomberg

Experian Customers Unsafe as Hackers Steal Credit Report Data - Bloomberg: The cyberthieves broke into an employee’s computer in September 2011 and stole the password for the bank’s online account with Experian Plc, the credit reporting agency with data on more than 740 million consumers.

Tuesday, November 20, 2012

Five Ways to Jump on the Instagram Bandwagon

Five Ways to Jump on the Instagram Bandwagon:

 So how can your company engage with the 7.3 million people who use Instagram daily? Here are five suggestions to get the Instagram ball rolling.

2012 conferences: Social media, tech & marketing | Socialmedia.biz

2012 conferences: Social media, tech & marketing | Socialmedia.biz:

"we’ve assembled a calendar of the best social media, technology, marketing and news media conferences for the upcoming year. Here’s our roundup of 2012 conferences and events."

'via Blog this'

Sunday, November 18, 2012

Acoustic Absorbing Panels, Room Acoustics Treatment by Audimute – Effective, Affordable Panel Acoustics Kit - Audimute Soundproofing

Acoustic Absorbing Panels, Room Acoustics Treatment by Audimute – Effective, Affordable Panel Acoustics Kit - Audimute Soundproofing: Are you looking for a room acoustics treatment that looks as good as it sounds?

Acoustic Panels | Acoustical Panels | Acoustic Wall Panels

Acoustic Panels | Acoustical Panels | Acoustic Wall Panels: Acoustic Panels are not used for soundproofing and they will not stop sound from traveling from one room to the next, however they will make the sound inside the room much less noisy, and the less noisy the room is inside, the less noisy it will be outside.

How do I prevent bass frequencies from pounding on my neighbor's wall? - Yahoo! Answers

How do I prevent bass frequencies from pounding on my neighbor's wall? - Yahoo! Answers: I have a little problem where my neighbor can hear even the slightest amount of bass coming out of my speakers at a low volume.

HowStuffWorks "Blocking Sound Through the Walls"

HowStuffWorks "Blocking Sound Through the Walls": When contractors are building apartments or townhomes to sell, they're generally trying to keep construction costs as low as possible. To do this, they'll often construct walls in the cheapest way possible, with shared walls containing nothing more than some 2x4 studs with a layer of drywall on either side. In some buildings, they may add a layer of fiberglass batt insulation to help with noise and temperature control.

Tuesday, November 13, 2012

Silicon Valley Objects to Online Privacy Rule Proposals for Children - NYTimes.com

Silicon Valley Objects to Online Privacy Rule Proposals for Children - NYTimes.com:

Apple, Facebook, Google, Microsoft and Twitter have all objected to portions of a federal effort to strengthen online privacy protections for children.

Scammer Alert: Phishing for Photos | NBC 7 San Diego

Scammer Alert: Phishing for Photos | NBC 7 San Diego:

"We don't know what they're trying to do with those images," said Stephen Cobb with ESET Security, "but it's an indication of where future attacks may be coming."

'Parasite' porn websites stealing images and videos posted by young people | Technology | guardian.co.uk

'Parasite' porn websites stealing images and videos posted by young people | Technology | guardian.co.uk:

A study by the Internet Watch Foundation (IWF) reveals that 88% of self-made sexual or suggestive images and videos posted by young people, often on social networking sites, are taken from their original online location and uploaded on to other websites.

Monday, November 12, 2012

Karma Lekshe Tsomo

Karma Lekshe Tsomo:

In addition to her academic work, she is actively involved in interfaith dialogue and in grassroots initiatives for the empowerment of women.

Saturday, November 10, 2012

Melatonin vs Jet lag

Melatonin vs Jet lag:

I have had great success in using Melatonin and daylight to minimize jetlag. Here is the recipe I follow, taken from New York Times, April 30 1997.

Idaho Mountain Express: Hemingway on Hemingway - September 14, 2005

Idaho Mountain Express: Hemingway on Hemingway - September 14, 2005:

The inaugural Sun Valley Ernest Hemingway Festival takes place Sept. 22 to Sept. 24 in Ketchum and Sun Valley.

Malware Steals Image Files from Systems | Security Intelligence Blog | Trend Micro

Malware Steals Image Files from Systems | Security Intelligence Blog | Trend Micro:

It appears that information theft has taken a new form: we’ve found a malware that steals image files from all drives of an affected system and then sends them to a remote FTP server.

Friday, November 9, 2012

Web page security report

Web page security report:

"Maybe you can spot some suspicious details there.
For more comprehensive diagnostics consider the following"

'via Blog this'

Wednesday, November 7, 2012

iTunes - Podcasts - The Malware Report by ESET

iTunes - Podcasts - The Malware Report by ESET: "Anti-virus protection has changed. New forms of spyware, trojans, phishing, and run-time packers leave traditional anti-virus software, and your network, vulnerable. IT managers need new solutions to combat the ever changing threats to network security."

'via Blog this'

Max OS X Lion Training: How to use Spotlight Search - YouTube

Max OS X Lion Training: How to use Spotlight Search - YouTube:

In this free lesson from our Mac OS X Lion training App discover how to use your Macs built in Spotlight search feature to locate files, launch apps, define words or perform calculations.

Sunday, November 4, 2012

Angels in Our Lives

Angels in Our Lives: The prophets knew the angels communicated with people through an area on the head where the pineal gland is located. This is the reason why the people in some religious groups shave their heads or shave a bald spot on the back of their heads.

IPM Workshops and Classes

IPM Workshops and Classes:

In this Exploring Inner Dynamics Workshop you will experience the Real You; a soul with a unique purpose and talents. Understand why you are here on Planet Earth.

Thursday, November 1, 2012

Election campaign ends with chess match in swing states - CNN.com

Election campaign ends with chess match in swing states - CNN.com:

"we need a president who understands business and I do, and that's why I'll be able to get this economy going.""

'via Blog this'

TJX Hacker Gets 20 Years in Prison | Threat Level | Wired.com

TJX Hacker Gets 20 Years in Prison | Threat Level | Wired.com: (Old)

Convicted TJX hacker Albert Gonzalez was sentenced to 20 years in prison on Thursday for leading a gang of cyberthieves who stole more than 90 million credit and debit card numbers from TJX and other retailers.

Sunday, October 28, 2012

Infosecurity - Consumer loyalty depends on privacy and data security, survey finds

Infosecurity - Consumer loyalty depends on privacy and data security, survey finds:

Consumers are taking privacy and security into account more often when making purchasing decisions, would consider leaving companies in the wake of a data breach incident, and measure corporate reputation based on these issues, according to a survey by public relations firm Edelman.

Wednesday, October 24, 2012

IRS policies help fuel tax refund fraud, officials say - CNN.com

IRS policies help fuel tax refund fraud, officials say - CNN.com:

"It's like the federal government is putting crack cocaine in candy machines," said Detective Craig Catlin of the North Miami Beach, Florida, Police Department. "It's that easy."

Tuesday, October 23, 2012

Chrome Web Store - PhishAri

Chrome Web Store - PhishAri:

PhishAri is a Twitter application which detects phishing tweets in realtime.

Paterva / Maltego

Paterva / Maltego:

Maltego is a unique platform developed to deliver a clear threat picture to the environment that an organization owns and operates.

Monday, October 22, 2012

Presentations by CAIDA

Presentations by CAIDA:

Awesome collection of research: Presentations by CAIDA personnel and collaborators are available for download below (UCSD)

3 Tools to Scan the File System With Custom Malware Signatures

3 Tools to Scan the File System With Custom Malware Signatures:

ClamAV is a free antivirus engine. Its Unix version allows the user to create custom signatures for files based not only on their cryptographic hash, but also to fingerprint file sections, match specific byte sequences, use wildcards, and combine signatures according to Boolean rules.

yara-project - A malware identification and classification tool - Google Project Hosting

yara-project - A malware identification and classification tool - Google Project Hosting:

YARA is a tool aimed at helping malware researchers to identify and classify malware samples. With YARA you can create descriptions of malware families based on textual or binary patterns contained on samples of those families

Google And Android To Move From Running Your Mobile Devices To Driving Your Cars? - Tapscape

Google And Android To Move From Running Your Mobile Devices To Driving Your Cars? - Tapscape:

Google isn’t just interested in dominating the information super highway by having a tight grip on the internet and the mobile device market via their Android devices. They also want to rule actual concrete-and-asphalt roads by filling them with Google driverless cars running on a combination of existing sensor technology and several homegrown platforms.

Many Android apps from Google Play security-challenged

Many Android apps from Google Play security-challenged:

German university researchers have found hundreds of popular Android apps in the Google Play market that leave 10s of millions of users vulnerable to attackers looking to steal banking credentials, credit card numbers and other personal information.

IRS pays billions in refunds to identity thieves - Aug. 2, 2012

IRS pays billions in refunds to identity thieves - Aug. 2, 2012:

IRS attributed the increase in tax fraud to a number of issues, including an increase in electronic filing, higher dollar amounts of refundable credits and a growing number of people using debit cards to receive refunds.

IRS pays billions in refunds to identity thieves - Aug. 2, 2012

IRS pays billions in refunds to identity thieves - Aug. 2, 2012:

It attributed the increase in tax fraud to a number of issues, including an increase in electronic filing, higher dollar amounts of refundable credits and a growing number of people using debit cards to receive refunds.

China cracks hacking syndicate | ZDNet

China cracks hacking syndicate | ZDNet:

Chinese police have detained a gang of hackers, certificate forgers, and personal data collectors, believed to be responsible for attacks on 185 government Web sites to manufacture and sell fake certificates ranging from medical care to financial services.

6 Ways to Add Twitter to Your WordPress Site

6 Ways to Add Twitter to Your WordPress Site:

This article will cover various ways to merge your Twitter presence with your website, and thus, maximize opportunities to relate to your web audience.

Sabu - The FBI's most valuable hacker — RT

Sabu - The FBI's most valuable hacker — RT:

In the nine months since the FBI busted the hacker known as Sabu for his roles with LulzSec and Anonymous, authorities say he worked all hours of the night to help them nab others within the group.

25% of Americans Were Victims of Security Breaches in Past Year

25% of Americans Were Victims of Security Breaches in Past Year:

One in four consumers in the United States had personal identification lost or stolen due to a data breach in the past year, a new study suggests.

Officials say Chinese spies have targeted every sector of the U.S. economy - Rock Center with Brian Williams

Officials say Chinese spies have targeted every sector of the U.S. economy - Rock Center with Brian Williams:

The Chinese are playing dirty in the international spy game, according to current and former intelligence officials at the highest levels of government.

China busts 700 cybercriminal gangs | ZDNet

China busts 700 cybercriminal gangs | ZDNet:

A country-wide Web policing campaign led by China's Ministry of Public Security has dealt a blow to 700 cybercriminal gangs in the country.

U.K. to probe Huawei, BT relationship over security concerns | ZDNet

U.K. to probe Huawei, BT relationship over security concerns | ZDNet:

The relationship between embattled Chinese telecoms equipment maker Huawei, and the U.K.'s largest telecoms company British Telecom (BT) will be investigated by the U.K. Parliament's intelligence and security committee.

Common WordPress Malware Infections — Smashing WordPress

Common WordPress Malware Infections — Smashing WordPress:

WordPress security is serious business. Exploits of vulnerabilities in WordPress’ architecture have led to mass compromises of servers through cross-site contamination.

Friday, October 19, 2012

Ranking America

Ranking America: "According to UNICEF, 23.1% of American children under the age of seventeen live in poverty, which makes the United States rank second out of thirty-five economically advanced countries ranked in that category. Romania ranks first, with 25.5% of children living in poverty."

'via Blog this'

Billing Records Mixed with Recyclables Causes Breach - HDM Latest News Article

Billing Records Mixed with Recyclables Causes Breach - HDM Latest News Article:

A mix-up by a janitorial services firm has resulted in a major data breach at a 19-member radiology group practice in Springfield, Mo.

Snooping Gets Employees Fired at Akron General - HDM Latest News Article

Snooping Gets Employees Fired at Akron General - HDM Latest News Article:

Akron General Medical Center in Ohio has terminated a “few” employees for snooping in the electronic health records system following the shooting death

Wednesday, October 17, 2012

Respondents were asked if they kept PII in a secure location

Demographics-Study.pdf (application/pdf Object)

http://www.laresinstitute.com/wp-content/uploads/2011/09/Demographics-Study.pdf

Respondents were asked if they kept PII in a secure location in their home, and overall 76% did,
and 24% did not, and interestingly, people with no college degree were more likely to keep their
information in a secure location than those that had a college or post-graduate degree.

Follow-Up Test: 1999 BMW 323i Sport

Follow-Up Test: 1999 BMW 323i Sport

The new 3 Series upholds the BMW tradition of stellar handling and makes a strong argument for the inherent balance of a finely tuned rear-drive car.

Sunday, October 14, 2012

House Is Gone but the Debt Lives On - WSJ.com

House Is Gone but the Debt Lives On - WSJ.com:

The result was a foreclosure hangover that homeowners rarely anticipate but increasingly face: a "deficiency judgment."

Tuesday, October 9, 2012

www.nqmobilefamily.com

www.nqmobilefamily.com:

'via Blog this'

Successful cyberattacks driving up cost of cybercrime, study finds

Successful cyberattacks driving up cost of cybercrime, study finds

Cyberattacks on organizations have more than doubled over a three-year period, driving up the costs associated with fallout from the attacks, according to a new study conducted by the Ponemon Institute.

Cyber crime costs UK organisations Q2.1m a year

Cyber crime costs UK organisations Q2.1m a year:

Cyber crime costs UK organisations an average of Q2.1m a year each, according to the 2012 Cost of Cyber Crime study by the Ponemon Institute.

New Research Shows Cybercrime Costs Have Increased Nearly 40 Percent - HotHardware

New Research Shows Cybercrime Costs Have Increased Nearly 40 Percent - HotHardware:

The third-annual Cost of Cyber Crime Study shows the occurrence of cyberattacks has more than doubled since 2010. The cost of the attacks has increased by nearly 40 percent over the same three year period.

Monday, September 24, 2012

Screening for Hemochromatosis — NEJM

Screening for Hemochromatosis — NEJM: Edwards and Kushner (June 3 issue)1 advocate universal screening for presymptomatic hemochromatosis. Such screening would probably identify 10 times the number of people with this condition now identified.

Screening for Hereditary Hemochromatosis: Systematic Review (continued)

Screening for Hereditary Hemochromatosis: Systematic Review (continued): U.S. Preventive Services Task Force. Guide to Clinical Preventive Services, 2nd ed. Washington, DC: Office of Disease Prevention and Health Promotion; 1996.

Garden State Owner Describes Misfire | NBC 7 San Diego

Garden State Owner Describes Misfire | NBC 7 San Diego:

Garden State Fireworks co-owner August Santore talks with NBC 7s Megan Tevrizian about what went wrong in San Diego on July 4, 2012

YouTube Downloader - Software to download and convert YouTube video

YouTube Downloader - Software to download and convert YouTube video:

YouTube Downloader is software that allows you to download videos from YouTube, Facebook, Google Video, Yahoo Video, and many others and convert them to other video formats.

Thursday, September 20, 2012

U.S.: Laws of war apply to cyber attacks - Army News | News from Afghanistan & Iraq - Army Times

U.S.: Laws of war apply to cyber attacks - Army News | News from Afghanistan & Iraq - Army Times: The U.S. government believes that cyber attacks can amount to armed attacks, and are subject to international humanitarian law and rules of war, the top State Department lawyer said Tuesday.

Why Be Invisible? - Public WiFi is just public - Firewalls and anti-virus can't stop your sensitive information from being stolen out of thin air.

Why Be Invisible? - Public WiFi is just public - Firewalls and anti-virus can't stop your sensitive information from being stolen out of thin air.:

Most people don’t realize that wifi signals are just radio waves. Anyone within range can “listen in” to what you’re sending as easily as tuning to the right station. All it takes is a laptop and simple, readily available software and a hacker can easily view:

Monday, September 17, 2012

The Mormon Candidate by Laurie Winer

Los Angeles Review of Books - The Mormon Candidate: When Romney stepped down as bishop to run for the U.S. Senate against Edward Kennedy in 1994, Carrel Sheldon may have been surprised to learn then that he believed “abortion should be safe and legal in this country.”

Thursday, September 13, 2012

Golden Trailer Awards

Golden Trailer Awards:

The 13th Annual Golden Trailer Awards
Winners were announced at the awards celebration on May 31st, 2012 in Los Angeles, California.
*Nominated Trailers are (listed in Alphabetical Order by Film Title)
*Order= Film Title, Studio/Production Company, Trailer house

Disk recovery service saves Wired writer from losing everything after MacBook Air hack | VentureBeat

Disk recovery service saves Wired writer from losing everything after MacBook Air hack | VentureBeat: Honan, of course, now backs up his data with physical copies.

The fee for the DriveSavers service is based on how large the media is and what data is recovered. It’s zero if DriveSavers fails to get back any of the desired data. Honan said he paid $1,690.

USB flash drive security - Wikipedia, the free encyclopedia

USB flash drive security - Wikipedia, the free encyclopedia: "In the early days of computer viruses and malware the primary means of transmission and infection was the floppy disk. Today, USB flash drives perform the same data and software storage and transfer role as the floppy disk, often used for transferring files between computers which may be on different networks or in different offices, owned by different people; this has made USB flash drives a leading form of information system infection. When a piece of malware gets onto a USB flash drive it may infect the devices into which that drive is subsequently plugged."

'via Blog this'

Does Cybercrime Really Cost $1 Trillion? - ProPublica

Does Cybercrime Really Cost $1 Trillion? - ProPublica: "Yet corporate cybersurveys are repeatedly invoked; the NSA’s Alexander is merely among the most prominent senior officials to do it. ProPublica provided the NSA’s media office with links to critical studies, stories and blog posts about the Symantec and McAfee numbers and asked whether Alexander or the agency was aware of them or, alternately, had other data to support the numbers he cited. The NSA media office responded: "The information is publicly available and was appropriately sourced.""

'via Blog this'

ICS-CERT Advisories and Reports Archive

ICS-CERT Advisories and Reports Archive:

"Control Systems Security Program (CSSP)
ICS-CERT Advisories and Reports Archive
Monthly Monitors  |  Alerts & Advisories (by Vendor)  |  Other Alerts & Advisories   |  Other Reports 
Notable ICS-Related Vulnerabilities"

'via Blog this'

Marketing Your Mobile App: Get It Right from the Start | BCP Business Center

Marketing Your Mobile App: Get It Right from the Start | BCP Business Center: "The app business is burgeoning and you’ve decided to get in on the boom.  Maybe you work for an exciting start-up or are striking out on your own.  Regardless of the size of your business, the Federal Trade Commission (FTC) — the nation’s consumer protection agency — has guidelines to help you comply with truth-in-advertising standards and basic privacy principles."

'via Blog this'

Three Killer Security Awareness Webcasts This Oct

Three Killer Security Awareness Webcasts This Oct: "Folks, as many of you know next month is NCSA (National Cyber Security Awareness) month. This is a great time to spruce up your security awareness program. To help energize your awareness training SANS Securing The Human will be hosting three free webcasts. Sign up now and don't miss a great opportunity to learn and share with others."

'via Blog this'

Wednesday, September 12, 2012

CISSP (7 Days)

CISSP (7 Days): "During our award-winning 7-day (ISC)² CISSP® Training Camp, students will live, learn, and take the CISSP certification exam at one of our state-of-the-art education centers. "

'via Blog this'

Monday, September 10, 2012

Why You Don’t Need Mac Anti-Virus Software - Plus What You Do Need

Why You Don’t Need Mac Anti-Virus Software - Plus What You Do Need:

“Some companies have done just fine having no anti-virus at all on their Mac population,” said David Johnson, a Forrester analyst and author of the report on managing Macs in the Windows-dominated computing environment found in most businesses.

And some have not....

Friday, September 7, 2012

▶ NO 'What's Your Name' by WhiteIrisRecs

▶ NO 'What's Your Name' by WhiteIrisRecs:
@playlist artwork
NO
2 tracks, 6.44 WhiteIrisRecs 2 months ago"

'via Blog this'

A dingo ate my Visa: 500K credit card numbers stolen in Australian hack | VentureBeat

A dingo ate my Visa: 500K credit card numbers stolen in Australian hack | VentureBeat:

According to SC Magazine, law enforcement was alerted to the scheme when banks started noticing fraudulent activity on the credit cards. It is expected that the 500,000 credit cards will be sold on the black market. The banks have already shut down access to those credit card numbers.

Tuesday, September 4, 2012

Hereditary hemochromatosis HFE: regula... [Ann Biol Clin (Paris). 2012] - PubMed - NCBI

Hereditary hemochromatosis HFE: regula... [Ann Biol Clin (Paris). 2012] - PubMed - NCBI:

"HFE hereditary hemochromatosis is a chronic illness (ALD n(o) 17 - Maladies métaboliques et héréditaires) which is the first genetic disease in France (60% of all genetic diseases)."

'via Blog this'

Friday, August 31, 2012

Oracle v. Google: The bewildering Java trial explained | Digital Trends

Oracle v. Google: The bewildering Java trial explained | Digital Trends:

"If Oracle wins its assertions that the Java APIs are copyrightable, the jury finding seems to imply that Google could be on the hook for infringement."

'via Blog this'

Oracle's Billion Dollar Question: Can You Copyright a Language?

Oracle's Billion Dollar Question: Can You Copyright a Language?:

"It is fair to say that Oracle figured it could take all the intellectual property it acquired from Sun and use it to make money through litigating companies that supposedly infringe on Java patents."

'via Blog this'

Thursday, August 30, 2012

Monday, August 27, 2012

Friday, August 24, 2012

Wednesday, August 22, 2012

More details on the Florida Hospital breach | PHIprivacy.net

More details on the Florida Hospital breach | PHIprivacy.net:

Dissent says: "The hospital couldn’t cooperate in an investigation involving theft of patient data because of HIPAA? I’d like to see/understand their explanation of this. I have sent an email inquiry to the hospital about certain points raised in WFTV’s coverage."

'via Blog this'

Monday, August 20, 2012

Why are elderly duped? Area in brain where doubt arises changes with age

Why are elderly duped? Area in brain where doubt arises changes with age

A study conducted for the National Institute of Justice in 2009 concluded that nearly 12 percent of Americans 60 and older had been exploited financially by a family member or a stranger. And, a report last year by insurer MetLife Inc. estimated the annual loss by victims of elder financial abuse at $2.9 billion.

FBI — New Internet Scam

FBI — New Internet Scam:

"There is a new “drive-by” virus on the Internet, and it often carries a fake message—and fine—purportedly from the FBI."

'via Blog this'

Saturday, August 18, 2012

Download Tableau Public | Tableau Public

Download Tableau Public | Tableau Public:

"Tableau Public is a free application that brings data to life. Create and share interactive charts and graphs, stunning maps, live dashboards and fun applications in minutes then publish anywhere on the web. Anyone can do it, it’s that easy—and it’s free."

'via Blog this'

Friday, August 17, 2012

Right Of Publicity � Brief History of RoP

Right Of Publicity � Brief History of RoP:

New York’s limiting viewpoint was addressed by Judge Jerome Frank in Haelan Laboratories, Inc. v. Topps Chewing Gum, Inc. 202 F.2d 866 (2nd Cir. 1953). In his decision, Judge Frank distinguished the “right of publicity” from the “right of privacy” by focusing on the economic interests involved, rather than the personal interests characteristic of the right of privacy. Haelan is also cited as the first articulation of these interests as the “Right of Publicity.”

Thursday, August 16, 2012

Germany Investigating Facebook's Face-Recognition Features Again

Germany Investigating Facebook's Face-Recognition Features Again

Data privacy officials in Germany have reopened a probe to look deeper at Facebook’s face recognition technology and determine if the social networking giant was collecting member photos without their knowledge.

TrapWire Antiterrorist Software Leaks Set Off Web Furor - NYTimes.com

TrapWire Antiterrorist Software Leaks Set Off Web Furor - NYTimes.com

A new release of stolen corporate e-mails by WikiLeaks has set off a flurry of concern and speculation around the world about a counterterrorist software program called TrapWire, which analyzes images from surveillance cameras and other data to try to identify terrorists planning attacks.

White hats publish DDoS hijacking manual, turn tables on attackers | Ars Technica

White hats publish DDoS hijacking manual, turn tables on attackers | Ars Technica

Turning the tables on miscreants who paralyze websites with torrents of junk data, security researchers have published a detailed manual that shows how to neutralize some of the Internet's most popular denial-of-service tools.

Daily Kos: The Gentleperson's Guide to Forum Spies

Daily Kos: The Gentleperson's Guide to Forum Spies

What follows is a lengthy dissertation on how to subvert/co-opt Internet discussion groups. A veritable how-to manual for Forum Trolls and Hijackers.

Monday, August 13, 2012

Wanna Hack Mars "Curiosity"? This is all it takes....

Could you hack into Mars rover Curiosity? | ExtremeTech: "The first approach would involve the would-be hacker building the equivalent of NASA’s Deep Space Network (DSN), a worldwide network of big-dish antenna that send and receive spacecraft signals, and perform radio astronomy. To perform uplink communications (to the rover), the DSN’s biggest antennae — 230-feet (70-meter) dishes — are outfitted with transmitters that deliver up to 400 kilowatts of output power. The hacker would also have to replicate the exact same encoding scheme (probably QPSK, the same as satellite TV) and use the same frequency (X band, around 8GHz)."

'via Blog this'

Sunday, August 12, 2012

Death Benefits for Google Employees...

Even if you've only worked at Google for weeks, you are entitled (or, rather, your significant other is entitled to) Google's Death Benefit:

Here's What Happens To Google Employees When They Die - Forbes: "Should a U.S. Googler pass away while under the employ of the 14-year old search giant, their surviving spouse or domestic partner will receive a check for 50% of their salary every year for the next decade. Even more surprising, a Google spokesperson confirms that there’s “no tenure requirement” for this benefit, meaning most of their 34 thousand Google employees qualify."

'via Blog this'

Saturday, August 11, 2012

Same Old Story...forgot to maintain important infrastructure

Here's a rant I have about failsafes: They were created so bad things would never happen. Think about factory explosions, oil spills, fires, and any of the thousands of catastrophes we see every year...each time there was a failsafe in place but, over the years, things were going so well, that upper management decided to forgo updates/upgrades or even regular maintenance because, well, things were going so well! That should never, ever be an excuse to justify not keeping failsafes up to date because the day will come when it all bites you in the arse.

AP NewsBreak: Refinery probe focusing on possible corrosion in decades-old pipe - The Washington Post: "Federal investigators probing the cause of a massive Chevron oil refinery fire are focusing on possible corrosion in a decades-old pipe the company inspected late last year but did not replace."

'via Blog this'

Wednesday, August 8, 2012

Has Hacking Team's government trojan been used against journalists? | Privacy International

Has Hacking Team's government trojan been used against journalists? | Privacy International:

According to Hacking Team, the Da Vinci software logs Skype calls, emails, instant messaging, web browsing records, deleted files and shots taken from the computer’s own webcam. In effect, the company claims that their product not only relays what's happening on a target’s computer, but also enables surveillance of anything that occurs within the range of the computer’s internal camera or microphone.

Hacking Team’s Remote Control System was detected 'in the wild' last week - shortly after Gamma International's FinSpy (a similar tool) was identified in email attachments sent to Bahraini activists.

Tuesday, August 7, 2012

This Hot Hybrid Hovercraft Needs a Little Extra Lift | Autopia | Wired.com

This Hot Hybrid Hovercraft Needs a Little Extra Lift | Autopia | Wired.com:

he promises that the Mercier-Jones hovercraft will be like nothing else ever built before. With an exterior inspired by exotic cars, the design also has a unique gas-electric hybrid drivetrain that allows for continuous airflow while still providing enough energy for short bursts of power necessary in high-speed maneuvering. The setup is lightweight and promises to be quieter than existing hovercraft.

This Hot Hybrid Hovercraft Needs a Little Extra Lift | Autopia | Wired.com

This Hot Hybrid Hovercraft Needs a Little Extra Lift | Autopia | Wired.com:

he promises that the Mercier-Jones hovercraft will be like nothing else ever built before. With an exterior inspired by exotic cars, the design also has a unique gas-electric hybrid drivetrain that allows for continuous airflow while still providing enough energy for short bursts of power necessary in high-speed maneuvering. The setup is lightweight and promises to be quieter than existing hovercraft.

Sunday, August 5, 2012

Creating masking tracks in Vegas

Creating masking tracks in Vegas:

"Vegas software has always offered robust video compositing features which make it possible to create sophisticated composited sequences without opening a dedicated compositing application."

'via Blog this'

Loading Progress Bar Intro - Free Download | Sony Vegas | Obviously Tech

Loading Progress Bar Intro - Free Download | Sony Vegas | Obviously Tech:

"Below you’ll find the loading progress bar effect in a video preview! You can download this effect as a simple .wmv video file so you can use it in your videos, and/or you can download it as a .veg Sony Vegas Project File to allow you to customize the loading bar yourself, change the colors, size, text, even add in extra text if you wish!"

Saturday, August 4, 2012

Skydiving record broken @ 220mph

I haven't even gone that fast being earth-bound! I can't imagine what it would feel like to fall that fast. Can you even keep your mouth closed at those speeds? Do you get bugs in your teeth? ;-)

Vertical skydiving record broken as 138 skydivers hit speeds of 220mph in snowflake formation - The Washington Post:

'via Blog this'

Thursday, August 2, 2012

FBI finally computerized!

You ever wonder why there have never been stories about the FBI being hacked? Well.... that was because they didn't have a digital system that was connected to others. (Seriously! There were full analog: paper and pencil!) Now, after all these years, the FBI is finally connected. Anyone placing bets on when the first hack happens? Anyone want to make a side bet on who, or which country, makes the first hack? How long before you can find FBI files with simple Google hacks? LMFAO!!

FBI Files Go Digital, After Delays and Cost Overruns - WSJ.com:

'via Blog this'

Wednesday, August 1, 2012

USB flash drive security - Wikipedia, the free encyclopedia

USB flash drive security - Wikipedia, the free encyclopedia

Companies in particular are at risk when sensitive data are stored on unsecured USB flash drives by employees, who use the devices to transport data outside the office.

Out of the Black: The Declassification of the NRO

Out of the Black: The Declassification of the NRO

As the documents illustrate, the issue of NRO declassification was considered as early as 1973. The documents further show that DCI Stansfield Turner (1977-1981) concluded that the fact of NRO and NRP existence did not meet the test of classification. As a result, Turner included declassification as part of a plan to revise the system of handling Sensitive Compartmented Information – but that plan was not implemented before the Carter administration was replaced by the Reagan administration, nor thereafter.

http://www.gwu.edu/~nsarchiv/NSAEBB/NSAEBB24/nsa25.pdf

Daily Kos: NSA: It's not the Privacy - it's the Incompetence

Daily Kos: NSA: It's not the Privacy - it's the Incompetence

If the call is of "interest", but an American is involved - that Americans name would be redacted and the file destroyed until surveillance was authorized by the FISA court. But even before 9/11 this was no longer the case according to Truthout.org

‘Control-Alt-Hack’ game lets players try their hand at computer security | UW Today

‘Control-Alt-Hack’ game lets players try their hand at computer security | UW Today

“Control-Alt-Hack” gives teenage and young-adult players a taste of what it means to be a computer-security professional defending against an ever-expanding range of digital threats"

'via Blog this'

Dropbox Reports User Accounts Were Hijacked, Adds New Security Features | TechCrunch

Dropbox Reports User Accounts Were Hijacked, Adds New Security Features | TechCrunch:

"Two-factor authentication, a way to optionally require a unique code in addition to your password when signing in."

Is not really two-factor.

'via Blog this'

BBC News - Tax havens: Super-rich 'hiding' at least $21tn

BBC News - Tax havens: Super-rich 'hiding' at least $21tn

"A global super-rich elite had at least $21 trillion (£13tn) hidden in secret tax havens by the end of 2010, according to a major study."

'via Blog this'

Tuesday, July 31, 2012

NSA Releases Disputed Email from Drake Case | Secrecy News

NSA Releases Disputed Email from Drake Case | Secrecy News

“If the system continues to be one-sided, where individuals are routinely held to account for supposedly improperly disclosing protected information but no one is ever held accountable for improperly classifying information in the first place, it sends a very clear message to the millions of individuals with security clearances to continue to overclassify with impunity. That does not bode well for either the security of our nation or our democratic form of government.”

ClevX DriveSecurity powered by ESET

ClevX DriveSecurity powered by ESET

ClevX DriveSecurity™ powered by ESET is a powerful antivirus utility that prevents malware from spreading via portable drives.

Monday, July 30, 2012

Daily Kos: The Gentleperson's Guide to Forum Spies

What follows is a lengthy dissertation on how to subvert/co-opt Internet discussion groups. A veritable how-to manual for Forum Trolls and Hijackers

Daily Kos: The Gentleperson's Guide to Forum Spies

10 Scariest Hacks CIO.com

10 Scariest Hacks CIO.com: Researchers from Black Hat and Defcon showed all manner of serious attacks on everything from browsers to automobiles.

Black Hat USA 2012 | Briefings

Black Hat USA 2012 | Briefings: This talk demonstrates how modern day financial applications, password and credit card managers, and other applications handling sensitive data are attacked on the iOS platform, and sometimes all too easily breached in as little as seconds. Attendees will learn how iOS applications are infected, how low-level classes and objects are manipulated and abused, logic checks bypassed, and other dark techniques used to steal data.

Saturday, July 28, 2012

Defcon 20: Skillz, thrills for the whole hacker family | Security & Privacy - CNET News

Defcon 20: Skillz, thrills for the whole hacker family | Security & Privacy - CNET News: This year's hacker show has something for everyone, from hardware hacking and zero-day contests to con games and nerd-core rappers.

NSA Chief: Agency Wants to Provide Malware Signatures, Not Enter Private Networks | Threat Level | Wired.com

NSA Chief: Agency Wants to Provide Malware Signatures, Not Enter Private Networks | Threat Level | Wired.com: the proposal the NSA had unsuccessfully pushed for at the White House would have required critical infrastructure companies – such as utilities, telecoms, ISPs, transportation and financial services companies – to allow their e-mail and other internet traffic to be scanned using threat signatures provided by the NSA and to turn over any evidence of a suspected attack to the government for analysis. The NSA felt the government needed an expanded role because private firms had failed to demonstrate that they were capable of defending themselves against cyber threats.

Sunday, July 22, 2012

Carney: Seek balance in a new pain-pill law

Carney: Seek balance in a new pain-pill law: Last week, a grand jury in Suffolk County released a report showing a dramatic increase in arrests and overdose deaths related to prescription painkillers there.

Demise of American Pain Foundation Can Help End the Opioid Lunacy | American News Report

Who sponsored this...

Demise of American Pain Foundation Can Help End the Opioid Lunacy | American News Report:

In the lunacy of the over-prescribing of opioids for all levels of pain in the U.S. and Canada, there is now a large dose of sanity. That sanity is an organization called Physicians for Responsible Opioid Prescribing (PROP). Their mission is to reduce morbidity and mortality from opioids and to promote cautious, safe, and responsible opioid prescribing practices

A severe and growing shortage of physicians willing to prescribe morphine and related opioid analgesics

There is a Pain Crisis in America. Its primary manifestation is the routine and widespread under-treatment of pain, especially chronic, non-cancer pain. Other manifestations include a severe and growing shortage of physicians willing to prescribe morphine and related opioid analgesics, the widespread use of more toxic and less efficacious classes of medications in an effort to avoid opioids, and the profound distortion of medical education and of the doctor-patient relationship.

Oldest Civilization may be in Antarctica

Oldest Civilization may be in Antarctica

"In 1949 the joint British-Swedish expedition conducted a thorough seismic exploration of the southernmost continent through the thick ice. The results coincided with the map of Reis. However, it was a mystery how the map data were to agree with the level of science of 1513."

'via Blog this'

Friday, July 20, 2012

CSA 1987

"COMPUTER SECURITY ACT OF 1987
Public Law 100-235 (H.R. 145)
January 8, 1988"

'via Blog this'

http://www.youtube.com/watch?v=2TaMepzJPP0&feature=youtu.be

Bank Sues Customer Over ACH/Wire Fraud

Bank Sues Customer Over ACH/Wire Fraud

Last week, a federal appellate court reversed a lower court's ruling in the ACH/wire fraud dispute between PATCO Construction Inc. and the former Ocean Bank, which is now part of People's United.

Sunday, July 15, 2012

Vizio Demo — Just another WordPress site

Vizio Demo — Just another WordPress site:

Another Post with Everything In It

Lorem ipsum dolor sit amet, consectetuer adipiscing elit. Curabitur quam augue, vehicula quis, tincidunt vel, varius vitae, nulla. Sed convallis orci.

Saturday, July 14, 2012

Problem loading page

https://d33ds.co/archive/yahoo-disclosure.txt

Apparently not there. Trying pastebin.

Friday, July 13, 2012

Govts should focus on cybersecurity education, not militarization | ZDNet

Govts should focus on cybersecurity education, not militarization | ZDNet:

Governments should spend more time and effort educating citizens and other countries on existing online threats and forge partnerships with private sector organizations rather than militarize the cyber arena.

According to Yaacob Ibrahim, Singapore's minister for information

DarkComet shut-down shows law enforcement works - CSO Online - Security and Risk

DarkComet shut-down shows law enforcement works - CSO Online - Security and Risk

"DarkComet made headlines in February, when it was used in siphoning information from the computers of Syrian activists opposed to dictator Bashar al-Assad,"

'via Blog this'

Trojan Downloader Determines OS, Infects Systems With Custom Malware | threatpost

Trojan Downloader Determines OS, Infects Systems With Custom Malware | threatpost

"A new downloader uncovered by researchers at the Finnish security firm F-Secure is capable of sniffing out which operating system a user is running and infecting them with a custom malicious payload."

'via Blog this'

Dark Comet RAT Tailored For Attacks On Gamers, Governments | threatpost

Dark Comet RAT Tailored For Attacks On Gamers, Governments | threatpost

"Researchers analyzing the Dark Comet remote access Trojan (RAT) program say that data from more than 400 campaigns suggests the malicious program is being used for a wide range of jobs, from attacks on online gamers, to potential hacks of air force bases and government Web sites."

'via Blog this'

Wednesday, July 11, 2012

Audio to Text - Speechpad

Audio to Text - Speechpad

Speechpad specializes in converting audio to text to create a high value document that can be read, searched and archived.

NSA: Cybercrime is 'the greatest transfer of wealth in history' | ZDNet

NSA: Cybercrime is 'the greatest transfer of wealth in history' | ZDNet

The director of the National Security Agency (NSA) has called cybercrime "the greatest transfer of wealth in history." As such, he urged politicians and the American population in general to support cybersecurity legislation being pushed through Congress.

Online Text to Speech Synthesizer

Online Text to Speech Synthesizer:

"You can quickly share the sound and text you entered by copying the generated link and pasting it somewhere."

'via Blog this'

The NSA Is Building the Country's Biggest Spy Center (Watch What You Say) | Threat Level | Wired.com

The NSA Is Building the Country's Biggest Spy Center (Watch What You Say) | Threat Level | Wired.com:

"In the process—and for the first time since Watergate and the other scandals of the Nixon administration—the NSA has turned its surveillance apparatus on the US and its citizens"

'via Blog this'

NSA Chief Denies Wired's Domestic Spying Story (Fourteen Times) In Congressional Hearing - Forbes

NSA Chief Denies Wired's Domestic Spying Story (Fourteen Times) In Congressional Hearing - Forbes:

"if Dick Cheney were elected president and wanted to detain and incessantly waterboard every American who sent an email making fun of his well-known hunting mishaps, what I’d like to know is, does the NSA have the technological capacity to identify those Cheney bashers based upon the content of their emails?"

'via Blog this'

NSA Chief: Cybercrime constitutes the “greatest transfer of wealth in history” | The Cable

NSA Chief: Cybercrime constitutes the “greatest transfer of wealth in history” | The Cable: But the real threat on the Internet will come when cyber attacksbecome militarized, a threat the U.S. must deal with now, he said.

Google May Pay $22.5 Million in FTC Privacy Settlement - Security - News & Reviews - eWeek.com

Google May Pay $22.5 Million in FTC Privacy Settlement - Security - News & Reviews - eWeek.com: "Google and the Federal Trade Commission are reportedly close to a settlement regarding charges Google circumvented privacy settings  in the Apple Safari Web browser."

'via Blog this'

Download Blue Cat's Phaser by Blue Cat Audio

Download Blue Cat's Phaser by Blue Cat Audio

"Modeled after vintage analog phaser circuits, Blue Cat's Phaser reproduces this old vintage phasing effect that you can find on so many recording"

'via Blog this'

Over 90 Free VST Effects Plugins

Over 90 Free VST Effects Plugins

"VST plugins can add power and flexibility to your digital audio workstation."

'via Blog this'

Monday, July 9, 2012

Free text to speech software with naturally sounding voices -- Free NaturalReader

Free text to speech software with naturally sounding voices -- Free NaturalReader:

"NaturalReader is a Text to Speech software with natural sounding voices. This easy to use software can convert any written text such as MS Word, Webpage, PDF files, and Emails into spoken words."

'via Blog this'

vozMe - From text to speech (speech synthesis)

vozMe - From text to speech (speech synthesis):

"Enter text in English"

'via Blog this'

Acapela Text to Speech Demo

Acapela Text to Speech Demo: "For demo and evaluation purpose only, for commercial use of generated sound files please go to www.acapela-box.com "

'via Blog this'

Online Text to Speech Synthesizer

Online Text to Speech Synthesizer

"This online application converts text into speech.
You may write anything into the text field and press the blue speak button at the bottom left. "

'via Blog this'

Saturday, July 7, 2012

Pena Nieto Bets on Pablo Escobar Nemesis to Win Mexico Drug War - Businessweek

Pena Nieto Bets on Pablo Escobar Nemesis to Win Mexico Drug War - Businessweek:

Drug War ‘Disaster’ -- “It’s a disaster,” said Suarez-Mier, who representedMexico’s attorney general when the Merida Initiative, a three-year, $1.6 billion anti-narcotics program funded by the U.S.,was signed in 2008. “When you decapitate a cartel, they tend tofracture and now we have more cartels that are more violent.”

U.S. pressures companies to report cybercrime – USATODAY.com

U.S. pressures companies to report cybercrime – USATODAY.com

Wyndham did not report the break-in in corporate filings even though the U.S. Securities and Exchange Commission wants companies to inform investors of cybercrimes.

Friday, July 6, 2012

Novel observations in hereditary hemochromatosis: potential implications for clinical strategies

Novel observations in hereditary hemochromatosis: potential implications for clinical strategies

raises the possibility that compensatory mechanisms exist to partially offset the hepcidin-mediated effects on dietary iron absorption in hereditary hemochromatosis patients with elevated transferrin saturation.

Thursday, July 5, 2012

Cybercriminals Sniff Out Vulnerability - WSJ.com

Cybercriminals Sniff Out Vulnerability - WSJ.com

With cybercriminals a greater threat to small businesses than ever before, more entrepreneurs like Lloyd Keilson are left asking themselves who is to blame for hacking attacks that drain their business accounts.

Find and Call: Leak and Spam - Securelist

Find and Call: Leak and Spam - Securelist:

The application is called ‘Find and Call’ and can be found in both the iOS Apple App Store and Android’s Google Play.

Wednesday, July 4, 2012

Vegas Pro 11 Overview

Vegas Pro 11 Overview

"an efficient, intuitive and integrated content creation environment for video and broadcast professionals."

'via Blog this'

Tuesday, July 3, 2012

Glyde – Your Online Garage Sale | Culture Milk

Glyde – Your Online Garage Sale | Culture Milk:

Of course, Glyde sells the actual product for a higher price, but the money you actually make through them is higher than any other service.

Make an Old Computer Your Home Security System | SecurityNewsDaily.com

Make an Old Computer Your Home Security System | SecurityNewsDaily.com:

Setting up a home camera security system on an old computer is easier than it seems, said Robert Siciliano, a security and ID theft expert based in Boston.

BBB teaches best back-to-school lesson: How students can avoid identity theft - DailyFinance

BBB teaches best back-to-school lesson: How students can avoid identity theft - DailyFinance:

College students have enough to worry about without falling prey to scammers looking to steal their identities and good credit.

Sunday, July 1, 2012

Group makes final push to rid DNSChanger infections - SC Magazine

Group makes final push to rid DNSChanger infections - SC Magazine

Despite months of warnings, 303,867 machines worldwide remain infected with DNSChanger malware

Stuxnet Will Come Back to Haunt Us - NYTimes.com

Stuxnet Will Come Back to Haunt Us - NYTimes.com

The decision by the United States and Israel to develop and then deploy the Stuxnet computer worm against an Iranian nuclear facility late in George W. Bush’s presidency marked a significant and dangerous turning point in the gradual militarization of the Internet.

Back-to-School Shopping? Avoid ATM Scams

Many shoppers are opting to use a debit card to pay for those purchases, increasing the potential of becoming a victim of various high tech scams.

Back-to-School Shopping? Avoid ATM Scams - MetroFamily Magazine - August 2011 - Oklahoma City, OK:

Credit, ATM and Debit Cards: What to do if They're Lost or Stolen

Credit, ATM and Debit Cards: What to do if They're Lost or Stolen

Your liability under federal law for unauthorized use of your ATM or debit card depends on how quickly you report the loss.

Information Technology: Edu phishing example

Information Technology: A scam first reported on May 14th of this year has returned. This time, an e-mail allegedly from Sarah Williams at the HelpDesk, includes a request for personal information (Username, Password, Address, and Department).

Amid Back-To-School Season, Feds Warn About ID Theft Scams Targeting Kids

Amid Back-To-School Season, Feds Warn About ID Theft Scams Targeting Kids

But federal authorities are warning parents that back-to-school season is actually a risky time of year when it comes to the potential for young people to become targeted by identity thieves.

How Amazon Saved My Life - IndieReader

How Amazon Saved My Life - IndieReader:

Did I cry over some of these rejections? Absolutely. Did I feel inadequate, untalented, hurt? Yes. Did I doubt my ability to craft a story that readers could fall in love with? You bet.

Saturday, June 30, 2012

Press Releases | TONIX Pharmaceuticals, Inc.

Press Releases | TONIX Pharmaceuticals, Inc.

"FM patients benefitted from bedtime very low dose cyclobenzaprine and that improvements were correlated with increased nights of restorative sleep. "

'via Blog this'

Online PTSD treatment for anxiety and stress

Online PTSD treatment for anxiety and stress:

"For those seeking treatment for PTSD and traumatic stress using confidential computer therapy, PTSDSTRESS.COM offers an affordable and effective treatment option that reduces the stress and painful memories of PTSD and traumatic stress"

'via Blog this'

New University of South Florida therapy may ease PTSD - News - Stripes

New University of South Florida therapy may ease PTSD - News - Stripes

"Accelerated resolution therapy uses elements of existing cognitive behavioral therapies, as well as lateral sets of left/right eye movements designed to minimize anxiety and body sensations associated with recall of traumatic memories, and replace distressing images with favorable ones. The treatment often only takes one to five sessions to complete and does not use drugs."

'via Blog this'

Thursday, June 28, 2012

Richard Zombeck: Below the Fold: Wells Fargo Gets Picked Up On Radar

Richard Zombeck: Below the Fold: Wells Fargo Gets Picked Up On Radar

"Matt Taibbi of Rolling Stone recently published an article that, while long is by no means a slog, details how the TBTF banks were engaged in bid rigging of municipal bonds in "virtually every state, district and territory in the United States," and how "Wall Street wiseguys" spent the past decade taking part in a breathtakingly broad scheme to skim billions of dollars from cities and small towns across America."

'via Blog this'

Tuesday, June 26, 2012

FTC sues Wyndham Hotels after three credit card breaches - SC Magazine

FTC sues Wyndham Hotels after three credit card breaches - SC Magazine

The Federal Trade Commission is suing a major hotel chain and its subsidiaries for allegedly failing to secure the financial information of its guests, which led to fraudulent charges of more than $10 million and the siphoning out of hundreds of thousands of credit card numbers.

Stuxnet Will Come Back to Haunt Us - NYTimes.com

Stuxnet Will Come Back to Haunt Us - NYTimes.com:
This mirrors what Stephen Cobb has been saying all along...no matter how hard you try to create a virus to attack a specific host, it will always get out into the wild. There's just no way to ensure that the virus was written perfectly (because, in part, there are no "prefect" systems?)
'via Blog this'

Facebook named in a third of divorce filings in 2011 - NY Daily News

Facebook named in a third of divorce filings in 2011 - NY Daily News:

I guess this puts a lot of private detectives out of business! No more crime novels where the grungy retired police officer stakeout cheap hotel rooms in the hopes of finding evidence to be used in a divorce. All they need to do now is look at Facebook pages?

I also recently read that scholarships are looking at applicants' Facebook pages when the applicant is looking for college money. If there are drunken pictures on the applicants' Facebook pages, no money for college. (Maybe that ought to be a type of intelligence test...if you're dumb enough to put up incriminating Facebook postings, then you're too dumb for college!)

Friday, June 22, 2012

Debunking cybercrime myths

Light Blue Touchpaper Blog Archive Debunking cybercrime myths

Our paper Measuring the Cost of Cybercrime sets out to debunk the scaremongering around online crime that governments and defence contractors are using to justify everything from increased surveillance to preparations for cyberwar

Thursday, June 21, 2012

Monday, June 18, 2012

Spokeo to Pay $800,000 to Settle FTC Charges Company Allegedly Marketed Information to Employers and Recruiters in Violation of FCRA

Spokeo to Pay $800,000 to Settle FTC Charges Company Allegedly Marketed Information to Employers and Recruiters in Violation of FCRA:

According to the FTC, Spokeo collects personal information about consumers from hundreds of online and offline data sources, including social networks. It merges the data to create detailed personal profiles of consumers. The profiles contain such information as name, address, age range, and email address. They also might include hobbies, ethnicity, religion, participation on social networking sites, and photos.

RPT-REUTERS SUMMIT-Hacked companies fight back with controversial steps - chicagotribune.com

RPT-REUTERS SUMMIT-Hacked companies fight back with controversial steps - chicagotribune.com: Other security experts say a more aggressive posture is
unlikely to have a significant impact in the near term in the
overall fight against cybercriminals and Internet espionage.

Pain Contracts: "Cooperation" or Coercion? | VMCA

Pain Contracts: "Cooperation" or Coercion? | VMCA

Pain Contracts are another result of the DEA's war on pain patients and their doctors. Doctors use pain contracts to cover their rear; as proof to the DEA and other law enforcement agencies that they are properly supervising those patients who get opiates. An additional benefit to doctors is that they serve to dissuade patients from filing lawsuits who have been discharged for failing to follow the rules. They treat pain patients as suspects in advance. But are these contracts really legally binding? Definitely not.

Sunday, June 17, 2012

What Is Hemochromatosis? - NHLBI, NIH

What Is Hemochromatosis? - NHLBI, NIH

For people who are diagnosed and treated early, a normal lifespan is possible. If left untreated, hemochromatosis can lead to severe organ damage and even death.

Clinical consequences of iron overload in hemochromatosis homozygotes

Clinical consequences of iron overload in hemochromatosis homozygotes:

This approach, however, is both impractical and unethical. Once cirrhosis due to hemochromatosis is established, life expectancy is shortened even if phlebotomy therapy is initiated.

Wednesday, June 13, 2012

I know someone whose 2-factor phone authentication was hacked... - William Edwards, Coder

I know someone whose 2-factor phone authentication was hacked... - William Edwards, Coder:

They key thing? Phone company support staff have been successfully socially engineered from like forever, and for those preferring technical attacks phones can be cloned too.

Google's two-factor glitch ends in 4chan attack - Security - News - ZDNet Australia

Google's two-factor glitch ends in 4chan attack - Security - News - ZDNet Australia:

Prince was using a 20 character, highly randomised password; however, the hackers were able to bypass it by asking Google for an account reset. One option for recovering an account is to have Google send a confirmation code to the phone number associated with the account, and where SMS is not available, it sends the code as a voice call.

Prince believes that the hackers began the recovery process and intercepted the confirmation code by socially engineering US telco AT&T's support staff to gain access to his voicemail, where the code would have ended up.

Microsoft scrambles as it patches 26 bugs, warns users of active attacks

Microsoft scrambles as it patches 26 bugs, warns users of active attacks

Seven weeks later, Microsoft tossed one of its Chinese partners, Hangzhou DPTech Technologies, from an information-sharing program it hosts for scores of antivirus firms. Microsoft said that DPTech had "breached our non-disclosure agreement" as it pinned the leak on the firm.

Why smart authors are cutting Amazon out | VentureBeat

Why smart authors are cutting Amazon out | VentureBeat:

So it would behoove all authors who can sell their book to sell it on their own website and not on Amazon.

Facebook privacy policy vote in: users don’t press ‘Like’ - Hindustan Times

Facebook privacy policy vote in: users don’t press ‘Like’ - Hindustan Times:

“Despite our significant efforts to encourage users to vote, only 342,632 people participated, which amounts to a tiny fraction of our user base of more than 900 million,” said Elliot Schrage, Vice President, Communications, Public Policy and Marketing at Facebook.

Monday, June 11, 2012

DEA public health damage

"It is important to note that much of the public health damage here is caused not by the doctors accused of wrongdoing, rather it is caused by doctors-in-good-standing who, faced with a patient in pain and therefore at risk of being targeted by the DEA, modify their treatment in an attempt to avoid regulatory attention."

Dr. DeLuca

Sunday, June 10, 2012

This is a problem:
The "chilling effect" is a phrase which describes the grotesque distortion of the norms of medical practice and the violation of the doctor-patient relationship that results from the withdrawal of physicians from the appropriate treatment of pain due to fear of litigation, loss of livelihood, and incarceration.

Friday, June 8, 2012

5150 (Involuntary psychiatric hold) - Wikipedia, the free encyclopedia

5150 (Involuntary psychiatric hold) - Wikipedia, the free encyclopedia

Section 5150 is a section of the California Welfare and Institutions Code (specifically, the Lanterman–Petris–Short Act or "LPS") which allows a qualified officer or clinician to involuntarily confine a person deemed to have a mental disorder that makes them a danger to him or her self, and/or others and/or gravely disabled.

Undeniable rights

Under California law, the following rights may never be denied (Cal. Welf. & Inst. Code § 5325.1):
  • The right to treatment services which promote the potential of the person to function independently. Treatment should be provided in ways that are least restrictive of the personal liberty of the individual.
  • The right to dignity, privacy, and humane care.
  • The right to be free from harm, including unnecessary or excessive physical restraint, isolation, medication, abuse, or neglect. Medication may not be used as punishment, for the convenience of staff, as a substitute for, or in quantities that interfere with the treatment program.
  • The right to prompt medical care and treatment.
  • The right to religious freedom and practice.
  • The right to participate in appropriate programs of publicly supported education.
  • The right to social interaction.
  • The right to physical exercise and recreational opportunities.
  • The right to be free from hazardous procedures.

Additional rights

Additionally, every mental health client has the right to see and receive the services of a Patients' Rights Advocate. All patients also have the following treatment rights:
  • The right to give or withhold informed consent to medical and psychiatric treatment, including the right to refuse medications (WIC-5325.2) except in emergency (W&I 5008 (m)) situations where danger to life is present; or by court order where the patient is found to lack the capacity to give or refuse informed consent via either a Capacity Hearing (see W&I 5332) and also known as a Riese hearing or via conservatorship.
  • The right to refuse psychosurgery (Cal. Welf. & Inst. Code § 5326.6).
  • The right to refuse electroconvulsive therapy (ECT) unless court ordered (Cal. Welf. & Inst. Code 5326.7.).
  • The right to confidentiality (Cal. Welf. & Inst. Code § 5328).
  • The right to inspect and copy the medical record, unless specific criteria are met (Cal. Health & Safety Code § 1795).
  • The right to have family/friends notified of certain treatment information with patient's permission (Cal. Welf. & Inst. Code § 5328.1).
  • The right to an aftercare plan (Cal. Welf. & Inst. Code § 5622).

Deniable rights with good cause

Psychiatric facilities must also uphold the following specific rights, which can be denied only when "good cause" exists.[4]
  • The right to wear one's own clothing.
  • The right to keep and use one's own personal possessions, including toilet articles, in a place accessible to the patient.
  • The right to keep and spend a reasonable sum of one's money for small purchases.
  • The right to have access to individual storage space for one's own use.
  • The right to see visitors each day.
  • The right to have reasonable access to phones both to make and receive confidential calls.
  • The right to have access to letter-writing materials, including stamps.
  • The right to mail and receive unopened letters and correspondence.

With good cause

Denying a patient's rights requires good cause. Good cause is defined as the belief of the professional in charge of care for the client that the specific right would cause
  1. a danger to self or others;
  2. a serious infringement on the rights of others; or
  3. serious damage to the facility;
and that there is no less restrictive measure that would protect against those occurrences.
Patient rights cannot be denied as a condition of admission, nor as part of a treatment plan (a doctor may not designate patient rights a 'privilege' or 'punishment'). Any time a right is denied under good cause, it must be documented in the patient's medical record and explained to the patient. The denial must be reviewed regularly and removed once good cause no longer exists.
When a right is denied, the reason given for denying the right must have some clear relationship to the right denied.[5] For example, a patient may be denied the right to keep his cigarettes (the right to keep and use personal possessions) because he is burning himself and lighting fires, and lesser restrictive alternatives (supervision during designated smoking times) have failed. This rule prevents facilities from denying rights as a form of punishment; for example, if a patient misbehaves by throwing food at another person, then the facility cannot take away personal possessions or deny visitors for the day.

Without good cause

If a right was denied without good cause, a patient can instruct his or her appointed public defender to file an Ex Parte application with the court to restore the right. After filing the application, a hearing is set and an opportunity to be heard by the judge concerning the merits of the case is reviewed; the judge determines if the right will be restored or remain listed as a "good cause" denial. An Ex Parte can bring relief in a matter when a person is deprived of any interest in liberty or property without due process of law.

Making Sense of Pain Relief

Welcome to Making Sense of Pain Relief: Health Care Providers Who Treat Pain: If you are looking for a health care provider to help treat your arthritis or joint pain, you have many options.

The use of OxyContin was associated with an average 2.3 day reduction in inpatient services among patients following total knee arthroplasty (Cheville et al., 2001). In addition data from two retrospective database studies have shown OxyContin to have economic advantages among the long-acting opioids. The first study showed that starting pain treatment using OxyContin for chronic pain conditions, compared to either controlled-release morphine sulfate (CRMS) or Duragesic, can produce savings on total healthcare costs, total pharmacy costs, long-acting opioid costs, and often times short-acting opioid costs.

Additionally, a second study documented the fact that health-care costs were $17,580 higher among patients who switched therapy versus those who did not. The study documented that patients who begin therapy with controlled-release oxycodone are less likely to switch to another medication than those initially treated with either transdermal fentanyl or CRMS. These findings are of economic relevance, as health-care costs are significantly higher among patients who switch LAO therapy in comparison with those who do not.

In summary, a consistent pattern of pain reduction or continuing, stable pain control supported the analgesic efficacy of OxyContin tablets among patients with malignant and non-malignant pain syndromes. Use of OxyContin has been associated with significant improvements in patientreported outcomes, and limited available economic evidence suggests that OxyContin represents
a cost-effective use of scarce health resources.
119

Question abot switching from OXYCONTIN to OPANA ER, Need some Info Please?

Question abot switching from OXYCONTIN to OPANA ER, Need some Info Please?

I have taken Oxycontin for many years at a dosage of 120 mg 4x daily, since people have abused Oxycontin so much, the pharmacutical company changed the breakdown, and therefore they don't work the same,

daily dose oxcontin - Google Search

daily dose oxcontin - Google Search

OxyContin 60 mg and 80 mg tablets, a single dose greater than 40 mg, or a total daily dose greater than 80 mg are only for use in opioid-tolerant patients.

Thursday, June 7, 2012

Protect Your Rights. Get Every Penny You Deserve.

Protect Your Rights. Get Every Penny You Deserve

 If you are applying for Social Security Disability Insurance, "SSDI," or Supplemental Security Income, "SSI," you must understand... the odds are overwhelming you will be denied... no matter how valid your claim!

Thursday, May 31, 2012

Meet the little box that could stop Flame and Stuxnet

Meet the little box that could stop Flame and Stuxnet | Crave - CNET

A new plug-and-play device for factories and power plants could stop malicious code from triggering a major malfunction, or worse.

Monday, May 28, 2012

InfoSec Resources – DarkComet Analysis – Understanding the Trojan used in Syrian Uprising

InfoSec Resources – DarkComet Analysis – Understanding the Trojan used in Syrian Uprising

two different samples delivered to the opponents of the regime, they found out that both of them were different versions of the popular DarkComet RAT.

Word Counter

Word Counter

Wordcounter is a word count and a character count tool. Simply place your cursor into the box and begin typing. Word counter will automatically count the number of words and characters as you type.

Thursday, May 24, 2012